Cyber Posture

CVE-2026-42997

High

Published: 05 May 2026

Published
05 May 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0001 1.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

An issue was discovered in idrac in OpenStack Ironic before 35.0.1. During import, a user invoking molds can request authorization to be sent to a remote endpoint. The credential forwarded is a time-limited Keystone token (which provides access to all…

more

OpenStack services Ironic is authorized for); or basic credentials configured for molds storage. The fixed versions are 26.1.6, 29.0.5, 32.0.1, and 35.0.1.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-669

Enforces proper authorization rules for any resource or data transfer between different spheres.

addresses: CWE-669

Accountability, documentation, and protection requirements ensure correct transfer of media resources between spheres.

addresses: CWE-669

Reduces incorrect transfers between spheres by establishing clear, separate domains for different sensitivities or functions.

addresses: CWE-669

It governs all resource transfers between spheres, preventing incorrect or unauthorized movement of data or capabilities across domain interfaces.

addresses: CWE-669

Addresses incorrect transfer of resources to an uncontrolled sphere by requiring approved destruction or sanitization methods.

Security SummaryAI

CVE-2026-42997 affects the iDRAC component in OpenStack Ironic versions before 35.0.1. The vulnerability arises during the import process when a user invoking molds can request that authorization credentials be forwarded to a remote endpoint under their control. These credentials include either a time-limited Keystone token, which grants access to all OpenStack services that Ironic is authorized for, or basic credentials configured for molds storage. The issue is classified under CWE-669 and carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).

A low-privileged user (PR:L) can exploit this over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). By specifying a malicious remote endpoint during molds import, the attacker receives the sensitive credentials, enabling high confidentiality impact (C:H) in a scoped context (S:C). This could allow the attacker to leverage the Keystone token for unauthorized access across authorized OpenStack services or use the basic credentials for molds storage.

OpenStack Security Advisory OSSA-2026-010 addresses the vulnerability, with fixes released in OpenStack Ironic versions 26.1.6, 29.0.5, 32.0.1, and 35.0.1. Security practitioners should upgrade to these versions to mitigate the issue. Further technical details are provided in the oss-security mailing list announcements at the referenced URLs.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
T1078.004 Cloud Accounts Stealth
Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Vulnerability directly enables an attacker to force forwarding of Keystone tokens/basic credentials to a remote endpoint (T1528: Steal Application Access Token and T1552: Unsecured Credentials); captured tokens then allow use of valid cloud accounts across OpenStack services (T1078.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References